A secure and traceable E-DRM system based on mobile device

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Web Server Management: Securing Access to Web Servers Jon Warbrick University of Cambridge Computing Service.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
無線環境的認證方法及其在電子商務應用之研究
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Author : Guilin Wang Source : Information Processing Letters
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptography and Network Security
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Cryptographic Hash Function
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
CS480 Cryptography and Information Security
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Privacy Preserving Ranked Multi-Keyword
Pooja programmer,cse department
Operating Systems Security
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
The Secure Sockets Layer (SSL) Protocol
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Key Management Network Systems Security
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
Controllable and Trustworthy Blockchain-based Cloud Data Management
Chapter 3 - Public-Key Cryptography & Authentication
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Presentation transcript:

A secure and traceable E-DRM system based on mobile device Source: Expert Systems with Applications, Vol. 35, No. 3, pp. 878-886, 2008 Authors: Chin-Ling Chen Reporter: Ya-Chieh Huang Date: 2009/3/19

Outline Introduction The proposed mobile E-DRM scheme Analyses Package Phase Register Phase Authorization Phase Analyses Conclusions

Introduction(1/2) Author Mobile User (MU) Package Server (PS) Content Server (CS) License Server (LS)

Introduction(2/2) The file structure of the mobile E-DRM system

Notations Parameter Usage The timestamp The time constant The digital certificate The ith one time password The initial random seed number The ith request random number, N0 = SEED The DRM format digital content International Mobile Equipment Identification The content identity The authorization request message of the mobile user The symmetric key is used to encrypt/decrypt the digital content Use X’s public/ secrete key to sign a message m Two collision free one way hash functions

Package Phase (1/4) The author creates the digital content and then sends it to the PS. PS CS Packs the digital content (M) Generates KEYCID Generates the content header (CH) Integrates C and CH into the mobile E-DRM format file

Package Phase (2/4) PS CS Stores the mobile E-DRM format file

Package Phase (3/4) PS LS Stores

Package Phase (4/4) After connecting to the public directory of the CS MU Downloads 1. the mobile E-DRM format file 2. the corresponding tamper resistant DRM-AP Realizes the authorization authority URL

Register Phase DRM-AP AA LS Cert, IMEI Verifies Cert Generates SEED Stores Cert, IEMI, and SEED SEED IEMI, Cert

Authorization Phase (1/3) The tamper resistant DRM-AP tries to open the protected the digital content (the ith times) DRM-AP AA Generates Checks Verifies Finds

Authorization Phase (2/3) DRM-AP AA Computes Generates Stores Stores

Authorization Phase (3/3) DRM-AP AA LS Compares with

Analyses Security issues No attacker can impersonate the legal party Against replay attacker Persistent protection issues Integrity issues Track usage of E-DRM work issues Integration with existing applications issues Portability issues

Conclusions Portability Security Low computation cost